mirror of
https://github.com/edk2-porting/linux-next.git
synced 2024-11-18 23:54:26 +08:00
md: protect against NULL reference when waiting to start a raid10.
When we fail to start a raid10 for some reason, we call md_unregister_thread to kill the thread that was created. Unfortunately md_thread() will then make one call into the handler (raid10d) even though md_wakeup_thread has not been called. This is not safe and as md_unregister_thread is called after mddev->private has been set to NULL, it will definitely cause a NULL dereference. So fix this at both ends: - md_thread should only call the handler if THREAD_WAKEUP has been set. - raid10 should call md_unregister_thread before setting things to NULL just like all the other raid modules do. This is applicable to 2.6.35 and later. Cc: stable@kernel.org Reported-by: "Citizen" <citizen_lee@thecus.com> Signed-off-by: NeilBrown <neilb@suse.de>
This commit is contained in:
parent
1a855a0606
commit
589a594be1
@ -6044,9 +6044,8 @@ static int md_thread(void * arg)
|
|||||||
|| kthread_should_stop(),
|
|| kthread_should_stop(),
|
||||||
thread->timeout);
|
thread->timeout);
|
||||||
|
|
||||||
clear_bit(THREAD_WAKEUP, &thread->flags);
|
if (test_and_clear_bit(THREAD_WAKEUP, &thread->flags))
|
||||||
|
thread->run(thread->mddev);
|
||||||
thread->run(thread->mddev);
|
|
||||||
}
|
}
|
||||||
|
|
||||||
return 0;
|
return 0;
|
||||||
|
@ -2397,13 +2397,13 @@ static int run(mddev_t *mddev)
|
|||||||
return 0;
|
return 0;
|
||||||
|
|
||||||
out_free_conf:
|
out_free_conf:
|
||||||
|
md_unregister_thread(mddev->thread);
|
||||||
if (conf->r10bio_pool)
|
if (conf->r10bio_pool)
|
||||||
mempool_destroy(conf->r10bio_pool);
|
mempool_destroy(conf->r10bio_pool);
|
||||||
safe_put_page(conf->tmppage);
|
safe_put_page(conf->tmppage);
|
||||||
kfree(conf->mirrors);
|
kfree(conf->mirrors);
|
||||||
kfree(conf);
|
kfree(conf);
|
||||||
mddev->private = NULL;
|
mddev->private = NULL;
|
||||||
md_unregister_thread(mddev->thread);
|
|
||||||
out:
|
out:
|
||||||
return -EIO;
|
return -EIO;
|
||||||
}
|
}
|
||||||
|
Loading…
Reference in New Issue
Block a user